| Deutsch English Français Italiano |
|
<v4kial$2219$10@i2pn2.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!news.nk.ca!rocksolid2!i2pn2.org!.POSTED!not-for-mail From: Richard Damon <richard@damon-family.org> Newsgroups: comp.theory,sci.logic Subject: Re: H(D,D) cannot even be asked about the behavior of D(D) V3 ---IGNORING ALL OTHER REPLIES Date: Sat, 15 Jun 2024 13:17:09 -0400 Organization: i2pn2 (i2pn.org) Message-ID: <v4kial$2219$10@i2pn2.org> References: <v45tec$4q15$1@dont-email.me> <v46na7$3ifov$4@i2pn2.org> <v48be9$rgsh$1@dont-email.me> <v48gh6$3kcoe$4@i2pn2.org> <v48jv2$se9c$1@dont-email.me> <v49dge$3kcoe$5@i2pn2.org> <v4a0hs$157ic$3@dont-email.me> <v4ak5o$3kcoe$6@i2pn2.org> <v4am8r$19edk$1@dont-email.me> <v4apjs$19rnv$1@dont-email.me> <v4arp0$1a7uo$1@dont-email.me> <v4b1c3$3nf9n$3@i2pn2.org> <v4b50m$1f89t$5@dont-email.me> <v4c12r$3oop0$3@i2pn2.org> <v4cjl7$1o4b4$1@dont-email.me> <v4d991$3qbnc$1@i2pn2.org> <v4da12$1sioe$1@dont-email.me> <v4dbmf$3qbnc$3@i2pn2.org> <v4dcd6$1sioe$3@dont-email.me> <v4df0h$3qbnd$1@i2pn2.org> <v4dhf5$1tsdf$2@dont-email.me> <v4dja1$3qbnd$5@i2pn2.org> <v4djhf$1tsdf$6@dont-email.me> <v4dk7b$3qbnc$8@i2pn2.org> <v4dl3b$225kb$1@dont-email.me> <v4dn5u$3qbnd$8@i2pn2.org> <v4dop4$22o4a$2@dont-email.me> <v4dq07$3qbnc$12@i2pn2.org> <v4dqq0$2353n$1@dont-email.me> <v4el9m$3rsd6$3@i2pn2.org> <v4f3ec$2akmh$2@dont-email.me> <v4g65a$3tn6q$1@i2pn2.org> <v4kh6a$3hugj$4@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Sat, 15 Jun 2024 17:17:09 -0000 (UTC) Injection-Info: i2pn2.org; logging-data="67625"; mail-complaints-to="usenet@i2pn2.org"; posting-account="diqKR1lalukngNWEqoq9/uFtbkm5U+w3w6FQ0yesrXg"; User-Agent: Mozilla Thunderbird Content-Language: en-US X-Spam-Checker-Version: SpamAssassin 4.0.0 In-Reply-To: <v4kh6a$3hugj$4@dont-email.me> Bytes: 5092 Lines: 78 On 6/15/24 12:57 PM, olcott wrote: > On 6/13/2024 8:24 PM, Richard Damon wrote: >> On 6/13/24 11:32 AM, olcott wrote: >>> >>> It is contingent upon you to show the exact steps of how H computes >>> the mapping from the x86 machine language finite string input to >>> H(D,D) using the finite string transformation rules specified by >>> the semantics of the x86 programming language that reaches the >>> behavior of the directly executed D(D) >>> >> >> Why? I don't claim it can. > > When I ask you to provide the mapping from the input > to H(D,D) to each step of the behavior of D(D) and > and you refuse then within Socratic questioning you > have proved to not be interested in an honest dialog. No, by asking a Red Herring question, *YOU* are showing that YOU are not interested in Honest Dialog, because you have been backed in to a corner. The fact that you keep on trying to redefine terms in strange ways just shows that you intend to be deceptive, so you aren't even not interested in an Honest Dialog, but you want to engage in deception. It is YOUR problem to solve, and you are just proving that you can't do it and have wasted your life on stuff you can't prove. > > The first six steps of this mapping are when instructions > at the machine address range of [00000cfc] to [00000d06] > are simulated/executed. > > What are the remaining steps that prove that the input > to H(D,D) has the behavior of D(D) ??? THE DEFINITION YOU DUMMY. Remember, "Inputs" don't have behavior, as they are only "finite string" BEHAIVOR is what Programs have. By the definition of a Halting Decider, the decider is to report on the behavior of the program the input represents. SO, H(D,D) is asking about the Program D(D). Now, if H(D,D) is NOT asking about the behavior of program D(D), then you are just admitting that you lied and didn't follow the instructions of Linz or Sipser, because in both cases, the high level description of what those inputs do, is to ask H on the behaviors of themselves, and *YOU* coded that as a call to H(D,D). SO, either you admit that you have been LYING about building the input per the proof, or you are LYING about H(D,D) not asking about the behavior of D(D). Either way, you are just admitting to being an ignorant liar. > > _D() > [00000cfc](01) 55 push ebp > [00000cfd](02) 8bec mov ebp,esp > [00000cff](03) 8b4508 mov eax,[ebp+08] > [00000d02](01) 50 push eax ; push D > [00000d03](03) 8b4d08 mov ecx,[ebp+08] > [00000d06](01) 51 push ecx ; push D > [00000d07](05) e800feffff call 00000b0c ; call H > [00000d0c](03) 83c408 add esp,+08 > [00000d0f](02) 85c0 test eax,eax > [00000d11](02) 7404 jz 00000d17 > [00000d13](02) 33c0 xor eax,eax > [00000d15](02) eb05 jmp 00000d1c > [00000d17](05) b801000000 mov eax,00000001 > [00000d1c](01) 5d pop ebp > [00000d1d](01) c3 ret > Size in bytes:(0034) [00000d1d] > >